The cryptocurrency-miner, a multi-component threat comprised of different Perl and Bash scripts, miner binaries, the application hider Xhide, and a scanner tool, propagates by scanning vulnerable machines and brute-forcing (primarily default) credentials.
As the new year rolls in, new developments in different ransomware strains have emerged. Here we discuss the different techniques that Clop, DeathRansom, and Maze ransomware use and the ways users and organizations can protect themselves against infection.
Financial applications are closely connected or even directly tied to a user’s finances, making them prime targets for cybercriminals. We provide simple steps and guidelines on how to protect mobile banking apps from common scams and malicious actors.